This book gives you a plan to build a secure business that can detect and respond to a cyber attack, delivered in a direct and succinct fashion. This book covers what IT must do, what the organizations must do at the management level, and how to verify it will work when needed.